0:15 What is needed for a GNSS spoofing attack
1:36 Config and run gps-sdr-sim
2:45 Live spoofing experiment setup
3:36 Config the GNSS receiver in the U-Center
4:09 Run the spoofer
4:52 Add GPS jammer to block authentic Glonass and Galileo signals.
5:35 Successful spoofing
6:00 Turn off the jammer to see what happens
In this video, we demonstrated how simple and cheap GPS/GNSS spoofing is. It can even be done on protected receivers!
We used HackRF One and Android phone with open-source projects from GitHub, which can undermine your GNSS-dependant critical infrastructure within a radius of hundreds of meters over-the-air.
More about types of GNSS spoofing attacks: gpspatron.com/types-of-gnss-s...
Links:
github.com/osqzss/gps-sdr-sim
cddis.nasa.gov/Data_and_Deriv...
github.com/demantz/hackrf_and...
Music from motionarray.com/
3 июн 2024